Skip to main content

Full text of "No Title"

See other formats

The software within the IM functionally separated into two 
categories: (1) the HOST side and, 2), the network ide. Since the HOST's 
staff can program the IMP, it is recommended that physical memory protection 
be provided. The following functions should be included in the software of 
the HOST side of the IMP: 
(1) IMP-HOST single. channel control 
(2) Buffers and buffer control 
(3) Message. to packets and packets to message conversion 
(4) acket formatting. 
The contractor shall leave sufficient memory .space for the HOST to add spec- 
ialized routines to do: 
(1).Character code conversion 
(2).Destination discrimination necessary for multiple HOSTS 
connected to the IMP 
(3) Repacking of binary messages. 
E. The IMP-C2kRRIER Interfaces 
The only 'variation from site to site of the CARRIER side of the IPs 
is the number of attached data-sets, so the IMP-CARRIER interfaces can be 
identical at all sites. This will be a multiplex interface capable of direct 
extension to handling six.(6) data-sets, asynchronous and in parallel, but 
implemented in a modular way with data-set control cards associated with each 
duplex carrier .link. The initial implementation need only contain those 
modules implied by the communication circuit map of Appendix B or its equiva- 
lent at the time of total network implementation. Although six data-sets 
may be connected to an IMP, the software should be designed to optimize the 
im'delays within the IMP for three .communications lines. 
'In order to achieve the speed and simplicity desired for the CARRIER 
side of the IMP, channel hardware is required for the following functions: 
(1) Character sensing, as required for start, stop, and escape 
char acte rs 
------------------------------<page break>-----------------------------
(2) 24 bit cyclic parity construction'and'comparison 
(3) Real time clock of bit time.(20 microseconds) resolution 
(.4) .Fault detection and status.presentation of fault type. 
If hardware is not, the ,design, the ability .of the soft- 
ware to accomplish these functions must be .clearly demonstrated. 
F, Ne twork/J-ozancseris t ics 
(1) Message delay i 
For th?poseof catculatiou and. eation, a simplified model of the 
neork isuted, .e od allow.the contractor to evaluate 
his ideas without the specific topology of the neork 
(which is.not yet fixed). or using the estited (and unreliable) HOST to 
HOST traffic statistics presented iu Appendix E, e'mel should be used 
in calculating e delay tis and metwork pacity. 
 'ssage Delay 
The message .delay is the.time required for a 100 character 
message (single packet message) togo from the origin IMP (associated 
with the sending HOST) to the destination IMP (associated with the 
receiving HOST), It is desired that the average message delay over the 
entire network be minimized. In particular, the average message delay 
should be less than 1/2 second  for a fully loaded network (as described 
in 3 below). 
The following factors shall be included in calculation of the 
message delay: 
_ a, Communications uelay 
Full Packet Transmission Delay 
34 13 
------------------------------<page break>-----------------------------
c. The input rate from the HOST to the IMP is Z0 kilobits 
per second. 
d. The traffic flow on each communication channel is 15 
kilobits per seco. nd,'. 
e. The sizes and distribution of normal packets will 'be 50% 
11Z bits long, and 50% 1040 bits long. Each of these packets must be 
acknowledged and an acknowledgement packet is 11Z bits long. The total 
distribution of packets is therefore 75% 11Z bits 'long'and Z5% 1040 bits 
long. The average number of bits per packet is therefore 364 bits. 
f. All nodes are separated by 300 miles. The predicted .delay 
due to distance on the communications line is 5.  microseconds per mile. 
In addition, there is an estimated 760 microsecond delay in the modem. 
Thus, total delay due to communications is 3.17 milliseconds per link. 
 "The parameters described above will allow calculation of: the 
total input rate into each IMP, the rate which packets enter and leave 
a node and thus the time available to process them; and the total message 
delay..,, The idder should illustrate' that the processor chosen will achieve 
the nessage delay and communication line capacity modeled or, if it can- 
'not, determine what message delay and capacity it can maintain. 
G. HOST-HOST Traffic Characteristics 
The HOST to HOST traffic volumes shown in Appendix E are 
based on the best (albeit poor) estimates, available at this time Note 
that this traffic is on a site to site basis, and not necessarily descriptive 
of the traffic on the various conurnunication network circuits. It is 
necessary to account for the nature of the routing doctrines used by the 
IIPS in order to develop estimates of circuit traffic. 
The trimoriel characteristic of the traffic arises from the three 
generation mechanisms at work. Type I traffic (high rate of or. igination, 
short length) is directly related to the individual keyboard actions of a 
user at a console. Type TT tra'ffic (moderate rate of originetlon, medium 
length),represents responses directed to a teletypewriter mechanism or 
 tO a.cathode ray tube display. Type LLI traffic (low rate of originetlon, 
long l'ength) re'presents large data transfers to and from nagnetic tapes, 
disks, cores, etc. 
------------------------------<page break>-----------------------------
The traffic generation processes are no__t necessarily independent, 
for a message from one host to another my well give rise to a message 
from the latter host to the former. One message, for instance, may be 
Type I and the response Type. II. Because of the interactive process in 
which many users may be involved, this form of traffic dependency might 
be quite prevalent. 
As a result of the communication.protocol, the communication 
circuits will be subjected to IMP generated. traffic. Message acknowledge- 
ments (Appendix F), for example, contrlcute. to this additional traffic. 
Such IMP generated traffic is .not included. in the estimates of Appendix E. 
H, IMP-Operator Interface 
The interface. with the operator is to consist of lights (or equiv- 
alent. displays) . and switches only. No :estrictions need be imposed regarding 
operator access to .the lights. It shall be possible to restrict (perhaps by 
use of a lock and key) access to those switches that can be used to affect 
the operation of the IMP. 
Appendix ''" 
.D,. Input and Output Facilities for the IMP'Operator," 
describes the minimum .facilities to. be p:ovided.. Additional facilities 
should be provided,.as :equired for..reasons. of operation, debugging, and 
II.' Network Contractor Performance 
The contract Will-be .for the design of the full 19 node network and 
the 'installation of the .four' node' test' netsyork, The four IMPS shall be 
installed on .site .and functioning.within nine months fter' the start of the 
contra--am'e ' Contractors' responsibility for the IMPS shall continue for 
three months after delivery; thus the totals contractual period for the test 
network shall be one year', To help evaluate the eventual size of the network 
and the phasing' of installations, each, quotation should include unit prices 
for additional quantities of. 10, 15 and 20. The unit cost for 
installation should .also be estimated. 
The Contractor shall have full system responsibility; separate quota- 
tions for hardware or software alone will not be accepted. If the quoter 
expects to subcontract for either the hardware or software, the details of- 
the arrangement, i.e., manufactu:er', delivery schedule and price, 
should be included in the quotation. The quoter shall: 
------------------------------<page break>-----------------------------
Design the COMMUNICATION SUBNET consisting of: 
1. Nineteen.. (19) IMPs (interf. ace message proccssors) 
2. Nineteen %9) data-set mmltiplexor interfaces capable of 
handling six (6) full-duplex 50 kbps lines simultaneously and providing 
the i/O processing required for full occupancy of all lines 
3. Nineteen (19) HOST-IMP standard interfaces capable of 
transferring data at a data rate in excess of one megabit per second 
(preferably one-half the IMP'memory data rate). 
The communication software, which must'provide 
a. Store-and-forward facilitie c route 
b. Positive and negateve message acknowledgement 
c. Fault detection and recovery to guarantee virtually error- 
free tr.,nsmii sion 
d. INIP-L'vP control and response as required by the system 
design and network parameter measurement requirements 
e. Message decomposition to communication packets and 
reassembly to messagd form in the transmitting and receiving IMPS 
r e sp ec tively 
f. Priority handling of shorter messages. 
5. The assembly or compilation software required for the con- 
struction of IMP programs by the user contractors, implemented on 
some system or systems accessible to the user contractors. 
B. Construct a prototype IMP including the IMP-CA. RP, LEP, and 
HOST-LViP interfaces. vrrite, checkout and demonstrate the communi- 
cation programs operationally in this prototype.. Attach this prototype 
to the selected CAI{IIEi and carry out a closed loop connection and 
demonstrate t?/e operation of the communication system design as pro- 
posed by the network contractor and accepted by 
'38 17 
------------------------------<page break>-----------------------------
C. Construct .and install four IMPS and,_associated'interfaces at SRI, 
UCLA, UCSB, U, .of, Utah, and demonstrate the. total network design as proposed 
by the Contractor and accepted by ARPA. 
D. At the time of .completion of prototype checkout, the Contractor shall 
provide. system documentation in regard to the. IMP hardware, the communication 
software, the'.IMP programming language and the .appropriate HOST-IMP interface. 
III. Elements of System Design 
The networks'Contractor, in proposing a system design, should be sure 
to include. his. considerations concerning: 
A. Message decomposition .and assembly iu terms of' efficient communica- 
tion packets 
B. Acknowledgement procedures 
C. Routing algorithms 
D. Traffic control 
E. Error assessment .and recovery 
F. IMPHOST interface 
G, IMP-CARRIER interface 
.H. Fault recovery 
I. IMP-IMP control messages.and interrupt facility 
J. Estimated .timing factors, e.g,, queuing and processing delays in 
packet transmission 
K. Network performance measurements 
L. Buffer sizes, memory size for the CAR1LIER side of the IMP, memory 
size for the HOST side of the IMP 
M. Network performance estimates of the totally implemented network 
39 18 
------------------------------<page break>-----------------------------
Complete description of the processor and peripheral equipment* 
O.. Descrip:io of all special purpose hardware required. 
The network contractor should include his considerations concerning the 
following optional items: 
2%.. 1Viodifications for multiple HOSTS connected' to one I1VIP 
B. 1Viemory protection to maintain store-and-forward operation 
during checkout of new I1VIP programs 
2%dditional hardware and software necessary for the IA4P to 
.be a terminal controller and/or data concentrator for its 
HOST or for the network (i.e., no HOST, just terminals). 
*it is anticipated that mass storage devices such as tapes, disks or 
drums will not be required for the normal operation of.the'llvIP. 
4O 19 
------------------------------<page break>-----------------------------
------------------------------<page break>-----------------------------
') 0 
- 0 
------------------------------<page break>-----------------------------
AiPEN]/iX O 
IivP Delivery Schedule 
O_.pc r;tioJ];tl 
(in months acr contract star) 
DAlqT 16 
MAC 15 
BBN 15 
HARV 1 5 
LL 15 
BTL 14 
ARPA 13 
CMU 13 
ul lZ 
uI .1z 
wu 16 
SP, I 9* 
UCB 11 
SU 14 
UCSB 9* 
UCLA 9* 
SDC 11 
lqAlq D 14 
*These four IA4Ps constitute the test network. 
------------------------------<page break>-----------------------------
Input and Output Facilities /or the LMP Operator 
Contents of thc progran% countcr 
Contents of the instruction register 
Concnts of the accurulator rcgistcr 
On-off state of electrical po%v'er .o computer 
lun-halt state of con, purer 
Busy-idle state of cach direction of each IMP-HOST channel 
Translrit-no transmit state of each communication terminal 
lcceive-no receive state .of each communication terminal 
Connected-not connected state of each switched communication terminal 
In service-out of service state of each communication terminal 
1. Change contents of the program counter 
Z. Change contents of the accumulator 
3. Turn electrical on-off to computer 
4. Cause computer run, single step,. halt 
5. Cause coputer to lead from HOST or communication terminal 
6. Cause computer to dump to I-IOST or cornrnunicatlon terminal 
7.. Cause master clear in computer 
8. Make-busy specified data terminals 
Force disconnect of specified data terminal 
Limit-no limit access to all other operator inputs 
------------------------------<page break>-----------------------------
------------------------------<page break>-----------------------------
This section describes the data communications conventions wh[cl 
specify at a gross level the protocol which allows the host to communicate 
v, ith its IMP and the IMP's to connunicatc with one anotler. This sec- 
tion, like the others, is designed to provide guidelines to the contractoz' 
who rty, if he wishes, modify any part of the de. scriiotion in'his proposal. 
Each modification will be evaluated, and will be considered in the final 
' contractor selection. 
The Host and the IMP communicate using a form called a Message. 
There are two kinds of messages, the first being a Message destined for 
(or coming from) another Host; the second is a message to be interpreted 
by the IMP as an IMP command (or generated by the IMP for the informa- 
tion of the host). The first type of message vill be called the "Normal" 
message because the primary function of the MessagcSwitching Nctwork 
is the transrission of this n%essage to the destination host. The other 
type of message will be called the "abnormal" message and will be used 
for functions such as the 'query to (and rcsponsc fron%) the Host to insure 
that the Host (and IMP) are functioning properly, error messages to indi. 
cate format or illegal cigaractor errors in "Normal" messages, etc. 
A normal nessage vhen transmittd to the IMP, will consist of not 
more than 8, 19 2 bits of information and should contain the name of the 
destination t-lost and an identification number which can be used for refer- 
once by the IMP and the receiving Host. The bit structure of thc normal 
message will be decided by the Host and will probably be different from 
machine to machine. It is the H6st's responsibility, however, to provide 
the character translation program for his IMP which converts his bit 
pattern to the standard form use'd oh the network. Since the translation 
may bc greater than one for one, the message may now be greater than 
the original 8, 19Z bits. The IMP can then m.ake a decision to send the 
longer message or return an abnormal message aying a format error 
has, then drop the message. 
The normal message has two kinds of information ~ character and 
binary. The principal difference between the handling.of these forms of 
------------------------------<page break>-----------------------------
information is that the character text will .be transformed from sending host's 
format to network standard format and then, after transmission is completed, 
to the receiving host's format; whereas binary text will be received bit for 
bit identical to what was sent (though some minor modifications may be made 
during. transmission, as described later). 
The forms and types of abnormal messages have not been worked out in 
detail. It will be the'.Contractor's responsibility to decide what is required 
to maintain effective communications between the Host and its IMP. The most 
important constraint is that the. number and-variety of these messages be min- 
imized so as to minimize .the burden the IMP places on the Host (this is a basic 
network tenet). 
Your quotation.should .contain suggestions of the types of abnormal 
messages that. may 'be' required. This will by no'means .be' binding; it is ex- 
pected that. the final form.of abnormal messages will not be decided until after 
the testing of the initial (four.. node) network. 
IMP's communicate' with one'. another using- forms called Packets. There  
are two basic kinds .of packets: '%qormal" packet .is any packet whose final 
destination is as a normal message for a Host; an "Abnormal" packet is a 
packet whose final destination is an IMP.. All packets are to be equal to or 
less than 1024 bits starting with the first character of the Header and con- 
tinuing through the parity code. A packet has three elements within its 
structure: a Header which must be present in all packets, the Test (Binary 
and/or Character) which may be missing or null, and the parity check which 
will be 24 bits long. 
To simplify 'the logic and programming required, all packets will be 
transmitted on a continuous. stream over the communication line between IMP's, 
i.e., no nesting of packets is permitted. 
A "Normal" message may be broken into' several packets according to 
its size .(multiple packet message, MPM), but a packet will contain only one 
message. The packets in MPM are not bound together until they reach the 
destination IM2 where they are formed back into a normal message. 
------------------------------<page break>-----------------------------
. ;. *" ;:.y . - . '"" ,:zr '- ' T,a.t.s O[ nc'.-.;,".,r?. ....c'- :.'cc' ,".-'.- 
destination IMI  out of sequential order. A message may also ba small 
enough to fit into a single packct (Singlc Packct Message, SPM), or very 
snall, e.g. singlc character (cry Small Mcssage, VSM). All normal 
masagos generate nornal packeLs at sending, and visa versa at recciving. 
Abnormal packets are used for after control, acknow19dgamcnts, 
and the transrnission of network status, e.g. new renting tables, conumnni- 
cation line down, IMP down, I-Iost down, rncasurerncnt inforrnation, etc. 
An abnornual packet nuay be gencrated by an abnormal message or because. 
of some spcial intcrnal state of the IMP, e.g. buffers full. All abnormal 
packets nust be acknowledged with the exception of acknowledgenaent and 
negative acknowledgemcnt packets. 
The Packet Format is based on an eight bit code (character) format. 
The packet is sent in 8 bit transparent binary form, independent of whether 
the text is binary or character. Four special control. characters are 
required to delin[t the start and end of a packet and to maintain the com- 
munications line. The. control characters are: 
SYN (Synchronization character). This character is used to 
fill the communications line between packets; this is required 
because of the synchronous communications line. 
sTX (Start of Text). This character indicates the start of a 
packet and must be preceded by a DLE. 
ETX (End of Te)t). This character indicates the end of a 
packet and must be preceded by a DLE. The three character 
cyclic checksum must follow the ETX character. 
DLE (Data Link Escape). Th. is character is used to indicate 
the packet is transmitted in 5inary form. DLE is the only 
character that must be handled as a special case within the 
packet. If a DLE occurs within a pac.ket [t should bc preceded 
by an additional DLE on transmission, which should be deleted 
upon reception of the packet. 
------------------------------<page break>-----------------------------
Thu packet should look as oJlows: 
S S ]D S Fixed 
 ....  L T Length 
N N ]E X i-Icadcr 
LTSSSY .... Y 
EX 1 g 3N N 
The header is fixed length and contains all' the information required 
by theIMP's to transmit the packet to its final destination, The packet 
header as cnvisioncd to date is to contain six characters with the follow- 
irAg inforl-nation: 
1, Destination Code (8 bits) 
Z, Origin Code (8 bits) 
3, lViessage I,D, (I6 bits) 
4, Packet Number (5 bits) 
5, Hand Over Nutnbcr (6 bits) 
6, Packet Priority (1 bit) 
7, ]End to End vlessagc Acknowledgement Acquired (1 bit) 
8, Last Packet in Mcssagc (1 bit) 
9, Text is for I1VIP rather than i-Iost (1 bit) 
10, Text in' Packet is in binary (1 bit) 
Error Control 
A twenty-four bit cyclic parity check has been chosen as the error 
de'ection scheme, The cyclic parity check corresponds to polynotial 
multiplication. A !000 bit block of binary da. ta may be interpreted as a 
polynomial a(x) of degree 999 whose coefficients are zeroes and ones, 
Let g(x) be a polynomial of degree p xvith. binary coefficients, The prod- 
uct a(x)g(x) of the two polynomials with all coefficients reduced. modulo' 
two corresponds to a block of 1000 + p bits which may be error checked 
by polynomia ! division by g(x), It is possible to arrange matters so that 
49 '4 
------------------------------<page break>-----------------------------
the first 1000 bits are exactly equal to the {nforrnation bits and the last 
p bits are pr{ty check digits. This is possible fron the Euclidean dlv{'- 
sion algor[thn by selecting the lgs p bits to correspond to %he remainder 
polynonial when xPa(X) is reduced nodulo g(x). A p stage linear shift 
register can be constructed to pcrforn ally[sion by g(x) and his 
device can also bc used to detect the presence of errors since 
ol)crat{on rccui'cs division by gx).too. The g(x) rccoznncndcd 
gx)=(xlZ+x6x4+x+l)(x12+x10+x+x3+x+l). The shift register whickiplc- 
mcnts this code is illustrated below: 
1 N P u 'f 
This device is used for both the generation of the checksum and error 
detection, The device must be cleared upon receipt of the DS sequence 
s EX 
and started on the first character following the T character. 
The generation of the parity code is done by passing the packet bits stream 
through the device (including the final LT)., The parity code is then the 
24 bits left in the device and is obtained by shifting the bits out, 13aching 
them into characters and transmitting them (high order bit is the first one 
1 o the shift register). 
The detect{on of errors requires the passing of the packet through the 
device untilLT is sensed. The next three characters (the parity code) 
are input., then the 24 bits in the device are sensed for all zeros which 
indicat. cs thag no error has occurred. 
Using this parity check scheme the mean time between undetected errors 
v,{11 be approximately 1/2 to five years throughout the entire net.. 
5O 5 
------------------------------<page break>-----------------------------
(tExanp1 c ) 
 ,,, (5). LAST (1), B/NARY (1). END ACI{. 
Total Length 
! 0 _ 
------------------------------<page break>-----------------------------
.An IMi D, upon. receipt of a packc, mus decide which of its con- 
munications links t0 send the packet out on. Thc linc is chosen using thc 
I(ouing Table (liT) which must be gcncratcd by he IMP fron the Intcr- 
connccion Table (IT). The IT is a tabular dcscription of the interconnec- 
tion bctwccn nodes in the network, and is identical in each IP. Each 
IM must also have a routing table to tell it dir6ctly'which communication 
line is best to use to get a packet to another node. This table is called 
RT and is different in each IP. Described below is one ethod of obtain- 
ing thc routing; there are many others. The contractor should dcscribe 
hc one chosen for his systcm. The method below also chooses a particu- 
lar nctxvork configuration as an exaple. This nctork will not be thc final 
configuration. In this scheme an intermediate table must be gcncratcd frozn 
the IT which describes the number of links to'the destination IMP for each 
communication linc. The RT is formed from the Intermediate Table by 
sorting the lines into first, second, third and fourth choice. 
Interconnection Table 
The Network, as presently conceived, will have all point o point 
leased line comrmnicatious. The IT will therefore be fairly stable, 
changing only to: 
(1) Show the addition of new nodes and/or communication lines, and 
(2) Reflect the fact that an i/x/P or communication line has gone down 
or has come back UP' 
.An example network and its iT is given below. The nodes are 
numbered from.1 to 19, with a  indicating no connection exists; the four 
commun{cation lines are lettered A, B, C and D. 
Intermediate Table 
The interreed{ate Table is generated in each IMP from the IT each 
time' a change in the IT occurs. The techniqhe employed in this scheme 
involves starting with a cleared table and entering a 1 in the rovs corres- 
ponding t'the nodes connected directly to yours (n'earest ne{ghbors) and 
in the colunn representing the appropriate comrunication line. Then 
------------------------------<page break>-----------------------------
------------------------------<page break>-----------------------------
 1 7 
A }.% c D 
19 7 z 0 
8 1 3 '0 
2 4 17 0 
7 5 3 0 
8 6 .4 0 
9 5 7 0 
6 4 1 0 
10 5 2 0 
10 12 6 0 
11 9 8 o 
18 14 10 0 
16 13 9 0 
14 12 '0 0 
15 13 11 0 
16 14 10 0 
15 12 17 0 
3 16 18 0 
17 19 11 0 
18 15 1. 0 
Iat c rlrcdiat c 
A B C 
.5 4 ' 1 / - 
4 3 2, 
5 Z, 3 - 
6 3 3 - 
6 z 4 - 
6 ! 4 - 
5 4 g - 
5 3 4 - 
4 4 3 
3 5 4 - 
4 4' 5 - 
4 5 -. 
3 6 5 - 
3 5 4 - 
3 4 3 - 
254 - 
1,/6 5 - 
1 2 3 
c A A- 
G B A - 
B C A 
B C A - 
]5 C A 
B C A -. 
C B A - 
B C A -. 
C A B - 
A C B - 
B A c - 
A B - - 
A C B 
A C B - 
A C B - 
k c 
A C B - 
A.C B - 
------------------------------<page break>-----------------------------
SADSS 1968 July 29 
P, UG 9 1968 
The Defense Supply Service-Washington contemplates entering into an 
appropriate type of cost-reimbursement contract for Interface message 
processors for the Advanced Research Projects Agency (.{PA) computer 
network. The requirements for this work are set forth in the sample 
contract attached. 
You are' invited to submit your written quotation in quintuplet using the 
attached Standard Form 18, Reques: for QuoTations. Your quo:ation should 
include the following information: 
a.. Total estimated cost and.fixed..fee, if any, of the work to be 
b% Latest date, if any, upon which you are willing to enter into a 
c. Detailed cost and price analysis, using DD Form 633 setting forth: 
1. Manpower requirements (show by category of work). 
2. Supplies and materials. 
3. Other direct cost (specify). 
4'. General and a&ministrative expense (show basis). 
5. Indirect costs other than 4. above' (specify). 
6. Fixed fee, if any, for this contract will be negotiated 
using the weighted guidelines method set forth in Armed Services Pro- 
urement Regulation (ASPR) 3-808. 
------------------------------<page break>-----------------------------
SADSS 1968 July 29 
DD Form 633 attached to the analysis and executed. Breakdowns 
are required to support the reasonableness of your quotation and are for 
internal Department of Defense use only. Ihe information required will 
be held in strictest.confidence and will not be revealed to or discussed 
wth competitors. Your established method of costing may be used but 
should be described. 
Note: It is' important that your cost breakdown be submitted in such a man- 
ner hat it. can be separated completely.from the technical portion of your 
quotation. This will facilitate evaluation. 
d. Statement regarding your insurance program, copy attached, properly 
e. Names and .resumes of background and .qualifications of the person 
and an alternate who will be .assigned by you to be in charge of the entire 
project and other key professional personnel"you.propose to assign to he 
contrac t. 
f. The.names and telephone numbers of personnel of your organization 
;ho are authorized. to negotiate the proposed contract with the Government; 
g. 'Equal Opportunity Compliance. Report, properly executed. If the 
report has previously been submitted disregard this requirement. 
If your' quotation contains any information other than cost information 
which you do not want' disclosed to the public or used by the Government for 
any purpose other than evaluation of your offer, each sheet of such data 
must be marked with the legend set forth below: 
"This data furnished in response to .RFQ No.' DAHC15 69 Q 0002 shall 
not be disclosed outside the Government or be duplicated, used or 
disclosed in whole or in part for any purpose other than to evaluate 
the quotation; provided, that if a contract is awarded to this quoter 
as a result of or in connection with the submission of such data, the 
Government .will have the right to duplicate, use, or disclose th/s 
data to the extent provided in the contract. This restriction does 
not lim/t the .Government's right to use information contained in such 
data if it is obtained from another source." 
h. It is further requested that your quotation set forth the scope 
of the work required as you understand it. In this statement please indi- 
cate the number of manhours you have provided in your quotation for 
each of the various steps required. to .complete the contract work. This 
------------------------------<page break>-----------------------------
SADSS 1968 July 29 
will enable the Contracting .Officer to confirm have a complete 
understanding of what is required by the Government. Also, indicate in 
your proposal sufficient information. to allow evaluation in accordance 
with the criteria listed below. 
For he purpose of assisting interested_prospective contractors to prepare 
realistic quotations, a.preproposal conference will. be held'at the Pentagon 
in Room.SA 1070 on 14 August 1968 at 1:30 P.M.. Because of space limita- 
tions, each .quoter is required to limit attendance to two representatives. 
During the proproposal conference, questions concerning technical matters 
involved in the performance:of:work under the contract will be answered. 
To make. the conference as fruitful as possible 'quoters 'are asked to submit 
uestions in advance. Nothing done or said. at the conference shall be 
considered as altering, modifying or qualifying any contract resulting from 
this Request for Quotations. It will not be possible for the Government 
to make a technical presentation at any other time, therefore, quoters 
who fail to attend the conference set forth herein cannot be given the in- 
formation at any other time. 
All quotations received.will be subject to an evaluation by a.duly selected 
panel of qualified.Government personnel.for the purpose of selecting the 
quoter(s) with whom negotiations may be conducted. In addition to price the 
criteria set forth below is to be used in making the evaluation: 
1. Understanding and depth of 
analysis of .technical problems 
30 Points 
2. Availability of qualified, 
experienced personnel for 
assignment, hard- 
ware, and installation of system. 
25 Points 
3. Estimated functional per- 
formanco and choice of hard- 
ware, e.g. size, and availi- 
25 Points 
4. General quality, respon- 
siveness,,and corporate com- 
mitment to network concept. 
20 Points 
------------------------------<page break>-----------------------------
SADSS 1968 July 29 
Negotiations will be undertaken with those prospec:ive contractors whose 
quotations as to price and other factors. as determined by the Contracting 
Officer show them to .be qualified,..responsible and capable of performing 
the work. Negotiations will .be conducted in accordance with the principles 
stated in'ASPR. It is contemplated .that. the contract which will be entered 
into will be that most advantageous to.the'Government, price and other 
factors considered. 
Written quotations in duplicate will be '.received at' the Contracting 
Office, shown below, until 4:30 p.m., local time 9.September 1968. 
All quotations and any amendments thereto shall be inclosed in a sealed en- 
velope, showing on the outside thereof: 
Department of the Army 
Defense. Supply  Service-Washington 
Room 1D.245,.The Pentagon 
Washington, D..C. 20310 
ATTN: Mr._Daniel B. Dawkins 
All inquiries regarding this procurementshould be addressed to Mr. Daniel 
B. Dawkins, Area. Code 202, OXford 5-0494. 
5 Incl 
1. DD Form 633-4 
2. Insurance Statement 
3. SF 18 
Sincerely yours, 
Deput rocuremen t 
4. Annex "A", General Provisions 
5. 'Annex "B", Statement of Work 
------------------------------<page break>-----------------------------
$TAJ)AD FOtU,% 18, JU%Y 19 R FO CU)TTJC)S r 
DEFUSE SPLY SE/CE-HGTON See sale Con:rac: 
R0 1D 245 The Pen:agon x' 
Washtnzton, D.C. 20310 . Daniel B. Dawktns   
 ,) S Sample Contrac: 
Total ':a:ed Cos t $. 
Fe4 Fee 
Toat Estted Cost Plus Fed Fee $ 
IS SOLICITATION. Bdders, offerors and applican:s 
are ( autioned. :o no the "Certifition of on-SeErel ated 
de a: if. thwaun of e.hid or prosal exces 
$10,(00, e bdder, offeror or applint, by siEni :his 
bid (r offer certfies t. he does'no: and. will not 
or .P: ode for hs elees faili:ies which are se'egated 
 a. bas of:race, creed, color or ional.oriEin  %'herher 
such facilities..are segregated by dectve or on a dt facto 
basil .' Failure of a bidder or off. eror to. agree to 
cert: fication 11. rser .his.' hid or offer nonresponsJ ve 
:o  e :er of solici:ons olvi ds of conlrac:s 
ee, din E $10,000 which ae not exe,: from :he pri! ions 
of  e Eql' Oppor:ty- ctause (r. 68) 
NOTE: Reve must al be cplet by he quoit. 
21. GN'$  D  (Ty or p,/t) 22. N NO. (/,el,d, 
------------------------------<page break>-----------------------------
The Quoter represents and certifies as part of his quotation that: (Check or complete all applicable boxes or blocks.) 
He [] is, [] is not, a small business concern. A small business concern for the purpose of Government 
procurement is a concern, including its affiliates, which is independently owned and operated, is not dominant 
in the field of operation in which it is quoting on Government contracts, and can further qualify under the criteria 
concerning number of employees, average annual receipts, or other criteria, as prescribed by the Small Business 
Administration. (See Code of Federal Kegulations, Title 13, Part 121, as amended, which contains detailed 
industry definitions and related procedures.) If the quoter is a small business concern and is not the manufac- 
' .turer of the supplies offered, he. also represents that all supplies to be furnished hereunder [] will, [] will not, 
be manufactured or produced by a small business concern in the United States, its possessions, or Puerto Rico. 
2. R.EGULA.R DEALEK-MA.NUFACTURE, R (Applicable only to supply contracts exceeding $10,000.) 
He is a [] regular dealer in, [] manufacturer of, the supplies offered. 
excess of $2,500.) 
(a) By submission of this quotation, the quoter certifies, and in the case of a joint quotation, each party 
thereto certifies as to its own organization, that in connection with this procurement: 
(1) the prices in this quotation have heen arrived at independently, without consultation, communication, 
or agreement, for the purpose of restricting competition, as to any matter relating to such prices with any other 
quoter or with any competitor,; 
(2) unless otherwise required by law, the prices which have been quoted in this quotation have not been 
imowizgly disclosed by the quoter and will not knowingly be disclosed by the quoter prior to opening in the 
of an advertised procurement or prior to award in the case of a negotiated procurement, dl/ecfly or indirctiy to 
any other quoter or to any competitor; ad 
(3) no attempt has been made or will be made by the quoter to induce any other person or firm to sub- 
mlt or not to submit a quotation for the' purpose of restricting competition. 
(b) Each person signing this quotation certifies that: 
(1) he is the person in the quoter's organization responsible within that org'4. nization for the decision as to 
the prices being quoted herein and that he has not participated, and will not participate, in any actio. n contrary 
to (a}(l) through (a)(3) above; or 
(2)(i) He is not the person in the quoter's organization responsible within that organization for the decision 
as to the prices being' quoted tierein but that he has been authorized in writing to act as agent for the persons 
responsible for such decision in certifying that such persons have not participated, and will not participate, in any 
action contrary t  (a)(l) through (a)(3) above, and as their agent does hereby so certify; and (ii) he has not 
participated, and will not participate, in any action contrary to (a)(1) through (a)(3) above. 
() This certification is not applicable to a foreign quoter submitting a quotation.for a contract which re- 
quires performance. or deliver), outside the United States, its possessions, and Puerto Rico. 
(d) A quotation will not be considered for award where (a)(1), (a)(3), or 0a) above, has been deleted or 
modified. Where (a)(2) above, has been deleted or modified, the quotation will not be considered for award 
unless the quoter furnishes with his quotation a signed statement which sets forth in detail the circumstances of 
the cli1omarc and the head of the Agency, or hi designee, determines that such disclosure was not made for the 
putpace of rcricting competition. 
------------------------------<page break>-----------------------------
Page 2 
SCRIBED IN 18 U.S.C. 1001. 
CAUTION - LATE QUOTATIONS. See the special provision in this solicitation entitled 
a. DSS-W letter dated 26 July 1968, file RFQ No. DAHC15 68 Q 0002 is by this 
reference specifically mde a part of this Request for Quotations. 
b. The period of performance and work required by this Request for Quotation is 
set forth in the Sample Contract attached. 
c. The Contractor will be required to sign a contract substantially in accordance 
with the Sample Contract attached. 
Unnecessarily elaborate brochures or other presentations beyond that sufficient' to 
present a complete and effective proposal are not desired and may be construed as an 
indication of the offeror's lack of cost consciousness. Elaborate art work, expensive 
paper and bindings and expensive visual and other presentation aids are neither neces- 
sary nor wanted. 
When the response to this solicitation contains costs or charges for royalties 
totaling more than $250, the following information shall be furnished with your quota- 
tion on each separate item of royalty or license fee: 
(a) name and address of licensor; 
(b) date of license agreement; 
(c) patent numbers, patent application serial numbers or other basis on which 
the royalty is payable; 
(d) brief description, including any part or model numbers of each contract 
item or component on which the royalty is payable; 
(e) percentage or dollar rate of royalty per unit; 
(f) unit price of contract item; 
(g) number of units; and 
(h) total dollar amount of royalties. 
DD Form 783, Royalty Report, is approved for use in furnishing the above information. 
In addition, if specifically requested by the Contracting 0fficer prior to execution of 
the contract, a copy of the current license agreement and identification of applicable 
claims of specific patents shall be furnished. 
------------------------------<page break>-----------------------------
Page 3 
(a) Quotations and modifications received at. the-office designated in the Request 
for Quotations after the-close of business.on.the date set for'receipt thereof (or 
after the.time set for receipt if a particular time is specified) will not be con- 
sidered unless: 
(i) they are received before award is made; and either 
(ii) they are sent by registered mail, or by certified mail for which an offi- 
cial dated post office stamp (postmark) on the original receipt for Certified Mail has 
been obtained, or by telegraph; and, it is determined by the Government that late 
receipt was due solely to delay in the mails, or delay by the telegraph company, for 
which the offeror was not responsible; or 
(iii) if submitted by ail or telegram, it is determined by the Government that 
the late receipt was due solely to mishandling by the Government after receipt at the 
Government installation; provided, that timely receipt at such installation is estab- 
lished upon examination of an appropriate date or time stamp (if any) of such installa- 
tion, or of other documentary evidence of receipt at such installation (if readily 
available) within the control of such installation or of the post office serving it. 
(b). Offerors using certified mail are cautioned to obtain a'Receipt for Certified 
Mail showing a legible, dated postmark and to retain such receipt against the chance ! 
that it will be required as evidence that a late quotation was timely mailed. 
(c) The time of mailing of late quotations submitted by registered or certified 
mail shall be deemed to be the last minute of the date shown in the postmark on the 
registered mail receipt or registered mail wrapper or on the Receipt for Certified 
Mail unless the offeror furnishes evidence from the post office station of mailing 
which establishes an earlier time. In' the case of certified mail, the only acceptable 
evidence is as follows: (i) where the Receipt for Certified Mail identifies the post 
office station of mailing evidence furnished by :he offeror which establishes that the 
business day of that station ended at an earlier time, in which case the time of 
mailing shall be deemed to be the last minute of the business day of that station; or 
(ti) an entry'in ink on the Receipt for Certified Mail showing the time of mailing 
and the initials of the postal employee receiving the item and making the entry, with 
appropriate written verification of such entry from the post office station of mailing, 
in which case the time of mailing shall be the time shown in the entry. If the post- 
mark on the original Receipt for Certified Mail does not show a date, the offer shall 
not be considered. 
EQUAL OPPORTUNITY. (Complete the following.) 
The offeror represents that he ( ) has, ( ) has not, participated in a previous 
contract or subcontract subject to either the Equal Opportunity clause herein or the 
clause originally contained in Section 301 of Executive Order 10925; that he ( ) has, 
( ) has not, filed all required compliance reports; and that representations indicating 
submission of required compliance reports, signed by proposed subcontractors will be 
obtained prior to subcontract award. (The above representation need not be submitted 
in connection with contracts or subcontracts which are exempt from the clause.) 
Standard Form 100 is attached. 
------------------------------<page break>-----------------------------
Page 4 
BUY AMERICAN ACT. The following certificate must be executed prior to award. 
(Signing of the quotation.constitutes signing of certificate.) 
The bidder hereby certifies that each end product, except the end products 
excluded below, is a domestic source end product (as defined in the contract clause 
entitled "Buy American Act"); and that components of unknown origin have been considered 
to have been mined, produced, or manufactured outside the United States. 
EXCLUDED ITEMS (if none, please insert "None"): 
pecific information as to articles, materials, and supplies excepted from the Buy 
mertcan Act is available to prospective contractors upon request. 
In the event of an inconsistency between provisions of this solicitation, the in- 
consistency shall be resolved by giving precedence in the following order: (a) Annex 
"B", Statement of Work; (b) the Schedule; (c) terms and conditions of the solicitation; 
(d) General Provisions; (e) other provisions of the contract, where attached or incor- 
porated by reference. 
Prompt payment discounts will be considered in the evaluation of quotations, provided 
the minimum period for the offered discount is 20 calendar days. However, offered dis- 
counts of less than 20 calendar days will be taken if payment is made rithin the discount 
period, even though not considered in the evaluation. Time will be computed from the date 
a proper invoice is received in the office specified by the Covernment. For 'the purpose 
of earning the discount payment is deemed to be made on date of mailing of the Government 
This procurement is not a set aside for labor surplus area concerns. However, the 
quoter's status as such a concern may affect entitlement to award in the case of tie 
quotations or in the evaluation of quotations in accordance with the Buy American clause of 
this solicitation. In order to have his entitlement to a preference determined on the ocur- 
fence of those events, the quoter must identify below the areas in which the costs that he 
will incur on account of manufacturing or production (by himself or his first-tier subcon- 
tractors) amount to more than 50 percent of the contract price: 
------------------------------<page break>-----------------------------
Page 5 
Failure to list the proposed areas of performance as specified above will preclude con- 
sideration of such quoter as a labor surplus area concern. 
The quoter agrees that if, as a labor surplus area concern, he is awarded a contract for 
which he would not have qualified in the absence of such a classification, he will perform 
or cause to be performed the contract in accordance with the circumstances Justifying the 
The quoter shall stipulate a time within which the Government may accept his proposal. 
Prior to award of the contract resulting from this solicitation quoters shall submit 
a Certificate of Current Cost or Pricing Data as outlined in ASPR 3-807.4. 
Quoters should indicate the address to which payment should be mailed. 
CERTIFICATION OF NONSEGRECATED FACILITIES. (Applicable to contract, subcontracts, 
and agreements with applicants who are themselves performing federally assisted 
construction contracts, exceeding $10,000 which are not exempt from the provisions 
of the Equal Opportunity clause.) 
By the submission of this bid, the bidder, offeror, applicant, or subcontractor 
certifies that he does not maintain or provide for his employees any segregated 
facilities at any of his establishments, and that he does not permit his employees 
to perform their services at any location, under his control, where segregated fa- 
cilities are maintained. He certifies further that he will not maintain or pro- 
vide for his employees any segregated facilities at any of his establishments, and 
that he will not permit his employees to perform their services at any location, 
under his control, where segregated facilities are maintained. The bidder, offeror, 
applicant, or subcontractor agrees that a breach of this certification is a viola- 
tion of the Equal Opportunity clause in this contract. As used in this certification, 
the term "segregated facilities" means any waiting room, work areas, rest rooms and 
wash rooms, restaurants and other eating areas, time clock, locker rooms and other 
storage or dressing areas, parking lots, drinking fountains, recreation or entertain- 
ment areas, transportation,. and housing facilities provided for employees which are 
segregated by explicit directive or are in fact segregated on the basis of race, 
creed, color, or national origin, because of habit, local custom or otherwise. He 
further agrees that (except where he has obtained identical certifications from pro- 
posed subcontractors. for specific time periods) he will obtain identical certifications 
from proposed subcontractors prior to the award of subcontracts exceeding $10,000 
which are not exempt from the provisions of Equal Opportunity clause; that he will 
retain such certification in his files; and that he will forward the following notice 
to such proposed subcontractors (except where the proposed subcontractors have sub- 
mitted identical certifications for specific time periods): 
------------------------------<page break>-----------------------------
Page 6 
GATED FACILITIES. A Certification on Nonsegregated Facilities, as required by the 
May 9, 1967, order on Elimination of Segregated Facilities, by the Secretary of 
Labor (32 Fed. Reg. 7439, May 19, 1967), must be submitted prior to the award of a 
subcontract exceeding $10,000 which is not exempt from the provisions of the Equal 
Opportunity clause. The certification may be submitted either for each subcontract 
or for all subcontracts during a period (i.e., quarterly, semiannually, or annually). 
(Note: The penalty for making false statements in offers is prescribed in 18. U.S.C. 
------------------------------<page break>-----------------------------
lq NO. DC 69 q 0002 
Sample Contract 
Page 1 
Commencing .on the effective date of the.contract .and .ending within. 1 year the Contrac- 
'tot shall furnish.all necessary qualified personnel, material, and equipment, managing and 
directing the same to complete .the work described in Annex "B", Statement of Work, attached 
hereto and .by this reference specifically made a part .of the contract. 
a. Classified information and all information produced under classified contracts, 
hich the Contractor proposes to release to the public, must be reviewed prior to such 
release. This applies to all types.of disclosures, e.g., oral/visual disclosures by pre- 
sentations at unclassified meetings or documentary disclosures by publication of papers in 
technical Journals. It includes publicity releases, sales brochures, advertisements, etc. 
Requests for release such information shall be submitted, in five copies, by 
the Contractor directly to the Director, ARPA, ATTN: Security Review Officer. 
.b. Technical. Report Sumaries: The purpose of the report summary is to emphasize the 
importance of meaningful communication and to specify two' aspects of the reporting procedures 
required in the.FINAL REPORTS and those'. intermediate reports which the Contractor believes ' 
exhibit results significant enough to be noted.  
Ibis summary, prominently identified, should normally not exceed a few ;.ages. The 
purpose of the project must be specified, together with a description of important equipment 
purchased or developed, if any, and.the conclusions. reached by the Contractor. The most 
important single. feature of this summary is that it meaningful to readers who are 
not specialists in the subject matter.of.the contract. 
The requirement for. careful preparation:cannot be overemphasized as this summary 
will often provide. the basis for decisions on. the continuity of a project. The Contractor 
must recognize that his achievements are quite' often surveyed by Department of Defense staff 
function at a level that precludes a thorough review. of detailed reports. 
It is not intended that the summary be either didactic or oversimplified. Where 
appropriate, references should be made to more detailed sections of the report in order to 
guide those who may be prepared to spend. the additional time required to develop a more com- 
plete and professional understanding of the accomplishments. 
c. Abbreviations:Acronyms and.Code Names: It is important that the Contractor avoid 
abbreviations, acronyms or code names in the su-,-ry, or the detailed report, that are not 
spelled out immediately, e.g., LRL (Lawrence.Radiation Laboratory). If the abbreviation, 
------------------------------<page break>-----------------------------
RFQ NO. DAHC15 69 Q 0002 
sample Contract 
Page 2 
acronym or code name is to be used several times in succeeding paragraphs and sentences 
and in the body of the report itself, it is appropriate to use the abbreiation. However, 
it is imperative that every technical report, final or intermediate include a complete 
glossary of abbreviations, acronyms and code names displayed in the text. 
d. qarterly Management Reports: The primary purpose of thse brief reports, which 
should be in letter form and generally not exceed three (3) pages in length, is to inform 
various levels of management of significant events, accomplishments, and problems associated 
with the progress of work. The Management Reports should not be used to document technical 
progress or contain technical description such as graphs, charts, or formulae. These types 
of data belong in technical reports. 
The report should present a narrative s,,mmry of work performed including specific 
reference to the topics listed below. The initial report should include an introduction 
outlining the background, objectives, and assignment of responsibility for the project. 
Any of the following topics may he covered by inserting "none", "not applicable," 
or "no significant change," when appropriate. 
(i) Research Program and Plan. 
search will be included in the report. 
A brief staCemenC of objectives and plan of re- 
(ii) Major Accomplishments. This should include a brief description written in 
lay terms, of any finding or accomplishment considered worthy of being brought to the 
attention of management. The meeting of routine schedules should not be included, but 
accomplishment of major milestones should be reported. 
(iii) Problems Encountered. This topic should make reference to difficulties 
associated with personnel, facilities, contracts, availability of literature, funds, strikes, 
disasters, etc., which significantly affect the progress of the work involved. Problems 
of a technical nature should also be included, but in brief, non-technical terms. 
(iv) Fiscal Status. This should include: 
1. Amount currently funded. 
2. Estimated expenditures and commitments to date. 
3. Estimated funds required to complete the work. 
4. Estimated date of completion of the work (when different from that 
specified in the ARPA Order or contract). 
A copy of the fiscal portion of the quarterly management reports shall also be 
submitted to the Ccmracting Officer and the Administrative Contracting Officer. 
------------------------------<page break>-----------------------------
RFQ NO. DAHC15 69 Q 0002 
Sample Contract 
Page 3 
(v) Action Required by the Government. Normally this will include any assistance 
.required of ARPA in resolving "Problems Encountered". 
(vi) Future Plans. A brief statement of any significant change which is planned 
in the course of work under way or on any new item which is considered to be of interest 
to management. 
(vii) Milestone Report: A list of suggested milestones shall be submitted, in ten 
Copies. (Milestones are defined as points of accomplishment which represent significant 
progress when completed). The list shall include the initiation and completion date for 
each milestone. A brief description of the milestone should be provided, when necessary, 
to define specifically the accomplishment to be attained thereunder. The Milstone Report 
should be included in the Quarterly Management Report. 
Milestones should include major phases of hardware development and testing, 
decision dates on alternate approaches, dates by which control information on facilities 
or government equipment is required, dates by which a capability must be demonstrated, 
delivery dates, and other significant phasing and timing points. 
Upon approval by RPA of milestone information, copies of SD Form 350 (cop% 
attached), which contain appropriate instructions, will be made available for use in 
reporting progress against the milestone schedule. 
e. Interim Special Report of Major Events. The Contractor shall report major items 
of special significance, as they occur. These reports should reach ARPA within five (5) 
days of the event reported, utilizing TWX facilities when necessary. Such event items 
shall include, but not be restricted to, strikes and disasters, program delays, technical 
breakthroughs, major decisions, and requirement for increase in funding. One copy of any 
such report shall be furnished the Contracting Officer. 
f. Pogram Plan. The Contractor shal submit a program plan containing a detailed 
research plan, milestone plan, miles tone chart, and manpower loading chart for each major 
task; a chart depicting major subcontracts and equipment/material purchases, the date and 
approximate amount of each; and a chart depicting major Government furnished equipment 
(GFE) and facilities required, and the date and duration that such GFE or facilities are 
required. The estimated cost of GFE or facilities should be included if known. Three 
copies of the Program Plan shall be submitted directly to the Director, ARPA, Washington, 
D.C., 20301, within 30 days after the effective date of the contract. 
g. 9cartefly Technical Reports. This report shall present a concise and factual 
discussion of technical findings and accomplishments during the period. The report shall 
be of technical publication quality, including appropriate subject matter references. 
Three copies of the report shall be submitted by the Contractor directly to the Director, 
ARPA and are due within 30 days following the close of te report period. The report will 
present a concise and factual discussion of technical findings and accomplishments during 
he period. The report should be of technical publication quality, including appropriate 
subject matter references. 
------------------------------<page break>-----------------------------
RFQ NO. DAHCi$ 69 Q 0002 
Sample Contract 
Page 4 
h. Final Technical Report. Upon completion of the project, a final report will be 
submitted in lieu of the regular technical report, directly to the Director, ARPA. 
i. M/scellaneous Reports. In addition to the aforementioned written reports the 
Contractor shall periodically furnish such written data relative to contract performance 
as =my be requested by the Contracting Officer, and shall be prepared to discuss orally 
any phase of contract performance or progress as required by the Contracting Officer. 
J. A completed Document Control Data - R&D (DD Form 1&73) shall be included with each 
copy of a technical report required under the terms of the contract. 
k. The reports required by his Article and the deliverable items set forth elsewhere 
in the contract are data to be delivered in accordance with the clause entitled "Rights 
in Technical Data". 
1. The heading or cover page of each report shall contain the folloring information: 
.RPA Order No. 1260 
Contract Number 
Program Code No. 8D30 
Principal Investigator and Phone 
Name of Contractor 
Project Scientist or Engineer and 
Phone Number 
Effective Date of Contract 
Contract Expiration Date 
Short Title of Work 
Amount of Contract 
m. Each report prepared will include the following citation on the cover: 
Sponsored by 
Advanced Research Projects Agency 
ARPA Order No. 1260 
n. Each publication resulting from ARPA work will contain the following 
This research was supported by the 
Advanced Research Projects Agency 
of the Department of Defense under 
Contract No. 
------------------------------<page break>-----------------------------
RFQ NO. DAHC15 69 Q' 0002 
Sample Contract 
Page 5 
o. Three copies of each report (Management or Technical) shall be submitted to: 
Advanced Research Projects Age=cy 
Washington, D.C. 20301 
One copy of each te'chnical report on all ARPA work shall be sent to: 
Institute for Defense Analysis 
400 Army-Navy Drive 
Arlington, Virginia 22202 
q. Twenty copies of each technical report generated on ARPA Projects shall be 
submitted to: 
Defense Documentation Center 
Cameron Station 
Alexandria, Virginia 22314 
a. Schedule of Deliverable Items: 
i) .Quarterly Management Reports 
(ii) Interim'Special Report of 
Major Events 
(iii) Program Plan 
No. of Copies 
Deliver Date 
15 days after the close 
of the report period. 
As required by ARTICLE II. 
30 days after effecti ve 
date of contract. 
(iv) Quarterly Technical Reports 
30 days after the close of 
the report period. 
(v) Final Technical Report 
13 months after effective 
date of contract. 
b. The items set forth above in this ARTICLE III., do not represent the total amount 
of work to be performed'under the contract but are certain deliverable items set forth for 
administrative purposes. Other items not specifically set forth above, but required by 
the contract shall be delivered as specified elsewhere /n the contract, or if not so 
specified with the final report. 
------------------------------<page break>-----------------------------
RFQ NO. DAHC15 69 Q 0002 
Sample Con:fact 
P age 6 
c. Unless othetvse specified in the contract all deliverable items shall be 
delivered prepaid 
Advanced Research Projects Agency 
Washington, D.C. 20301 
ARTICLE IV. PROJECT OFFICER. The Contracting Officer may designate Contracting 
O,fficer's Technical Representatives to: 
a. Act as Project Officer under this contract. The Project Officer will receive 
for the Government, reports and other material called for in this contract and will 
represent the Contracting Officer in the technical phases of the work. The Project 
Officer is no: authorized :o change any of the terms and conditions of this contract. 
Changes in :he scope of work will be made only by the Contracting Officer by properly 
signed written modifications :o the contract. Such representatives as may be appointed 
will be specifically designated in a letter from the Contracting Officer :o the Contrac- 
b. Certify Contractor's "need to know" in connection with Contractor's: 
(1) requests for information from Government activities, 
(2) requests to private contractors for information developed pursuant to 
Government contracts, 
(3) visits to Government installations and other Government Contractors 
obtain information to be used in contract performance. 
AI{TICLE V. ALLOWABLE COSTS. It is understood and agreed that, subject to the provi- 
sions of Clause 3, "Allowable Cost, Fixed Fee and Payment", of the General Provisions 
the following shall be considered as allowable items of cost under the contract when 
incurred or paid by the Contractor and when necessary and required and used for the 
performance of the work hereunder; (this Article does not preclude the allowance of 
other costs allowable under Armed Services Procurement Regulation, Section XV): 
a. Salaries and Wages. Expenditures by the Contractor for salaries and wages of 
his personnel and borrowed personnel directly engaged in the performance of work here- 
under and properly allocable to this con:fact including Federal and State taxes paid 
by the Con:factor and properly allocable :o such salaries and wages. 
b. Travel and Subsistence. Reasonable subsistence not in excess of actual ite 
ized expenses of $ per day, or a per diem allowance in lieu :hereof of $ 
axed transportation for personnel employed in the perform.ance of this contract, while 
in travel status, provided such travel is necessary for the performance of this con: 
an4 .provided that, expenses for transportation hereunder by motor vehicle otker chat 
------------------------------<page break>-----------------------------
P. FQ NO. DAHC15 69 Q 0002 
Sample Contract 
Page 7 
common carrier or rented automobile shall be reimbursed on a reasonable actual expense 
basis, or at the Contractor 's option, on.a mileage basis at'a rate of $ . 
per mile, plus any toll or ferry.charges,. The, difference in cost between first-class 
air accommodations. and less'. than.. firs t-class.. air': accommodations' is unallowable except 
when less than first-class accomoda.'ions. are not reasonably available to meet mission 
requirements. Reasonableness shall be ascertained by a review of all facts pertaining 
to the specific cost by the Contracting Officer. Should transportation and subsistence 
Impenses be incurred .concuz-ently in connection.with the performance of more than one 
contract such expenditures allocated' on .an equitable basis to the contracts 
involved, such allocation. to 'be. based on a review of all pertinent facts concerned with 
the particular trip. 
c.. Materials and Supplies. Expenditures. by the Contractor for such materials, 
supplies, apparatus, equipment, and other articles.(including rental of apparatus and 
.equipment) properly-.allocable to:performance'.of hereunder. 
'd.' Indirect Costs.. A.proper method.of determining indirect. costs will be 
.ARTICLE VI.. MAXIMUM' CONTRACT COST, Subject to the provisions of Clause 2, "Lie4 tation 
of Cost", and Clause 3, "Allowable Cost, Fixed Fee and Payment", of the General Provi- 
s ions: 
a. The total. of.the AllOWable Cost under this. contract shall not exceed 
($ : ), which sum is the estimated 
total cost of the Contractor.'s performance hereunder, exclusive of fixed fee, and is 
based upon data on file in the office of the Contracting Officer and is to be considered 
as the "estimated' cost" for. the purpose of interpreting Clause 2, "Limitation of Cost" 
of the General Provisions. This limit may be increased from time to time by the Govern- 
ment solely at its discretion. 
b. In addition to-the.Allowable Cost aforesaid,'the Government shall pay the 
Contractor a fixed fee. of ($ 
for the performance of this contract. 
c. he total amount of this contract, inclusive of fixed fee, therefore, shall 
 .not:exceed ($ ) . 
d, Subject to the withholding requirements of the Ceneral Provisions the Contractor 
at the time of reimbursement. of allowable.cost will be entitled to payment of fee on the 
basis of such cost in. the same ratio as the total fee is to the total estimated cost ex- 
clusive of fee. 
------------------------------<page break>-----------------------------
RFQ NO. DAHCI$ 69 Q 0002 
Sample Contract 
Page 8 
The Contractor agrees that the performance of work and services, pursuant to the 
requirements of this contract, should conform to high professional standards. 
Annex "A" General Provisions, "Cost-Plus-Fixed-Fee Contract", is by this reference 
pecifically made a part of the contract. 
------------------------------<page break>-----------------------------
Index to Annex "A" 
ASPR Reference 
1. Definitions 
2. Limitation of Cost 
3. Allowable Cost, Fee and Payment 
4. Standards of Work 
5. Inspection and Correction of Defects 
6. Assignment of Claims 
7. Examination of Records 
8. Subcontracts 
9. Utilization of Small Business Concerns 
10. Term in a t ion 
11. Disputes 
12. Renegotiation 
13. Buy American Act 
14. Convict Labor 
15. Walsh-Healey Public Contracts Act 
16. Contract Work Hours Standards Act - Overtime Compensation 
17. Equal Opportunity 
18. Officials Not to Benefit 
19. Covenant Against Contingent Fees 
20. Authorization and Consent 
21. Notice and Assistance Regarding Patent Infringement 
22. Patent Riehts 
An appropriate Patents Rights clause will be select. ed 
23. Rights in Technical Oata 
24. Technical Data - Withholding of'Payment 
8-702 (a) 
7-103 J20 
25. Military Security Requirements 
26. Insurance - Liability to Third Persons 
27. Utilization of Concerns in Labor Surplus Areas. 
28. Payment for Overtime Premiums 
29. Competition in Subcontracting 
30. Audit and Records 
31. Price Reduction for Defective Cost or Pricing Data 
32. Subcontractor Cost and Pricing Data 
33. Filing of Ptent Applications 
34. Excusable Delays 
35. Negotiated Overhead Rates (if applicable) 
36. Gratuities 
37. Limitation on Withholding of Payments 
38. Small Business Subcontracting Program 
39. Labor Surplus Area Subcontracting Program 
40. Interest 
41. Changes 
42. Stop Work Order 
43. Reports of Work 
7-104.12 as modified by 7-204.12' 
12-102 ..6 
7-104.29 (a) 
7-205.7 (c) 
The above constitutes the General Provisions that will be incorporated in the 
contract resulting from this solicitation. It is economically impractical to 
include these provisions with each solicitation, however they will be provided 
upon your written request. 
------------------------------<page break>-----------------------------
Sponsoring Agency: 
Advanced Rasearch Projects Agency 
Washington, D.C. 20301 
------------------------------<page break>-----------------------------
Network Description 
A. Introduction 
B. Functional Description 
1. The User Subnet 
2. The Communication Subnet 
C. Functional Description of the IMPS 
1.' Breaking of Messages into Packets 
2. Management of Message Buffers 
3. Routing of Messages 
4. Generation, Analysis and Alteration of 
Formatted Messages 
5. Coordination of Activities with Other IMPS 
6. Coordination of Activities with its HOST(s) 
7. Measurement of Network Parameters and 
Func t ions 
8. Detection and Disposition of Faults 
9. I} Software Separation Protection 
D. The HOST-IMP Interfaces 
g. The IMP-CARRIER Interfaces 
F. Network Performance Characteristics 
1. Message Delay 
2. Reliability 
3. Network Capacity 
4. Network Model 
G. HOST-HOST Characteristics 
H. IMP-Operator Interface 
II. Network Contractor Performance 
Elements of System Design 
ARPA Network Nodes 
ARPA Network Topology 
IMP Delivery Schedule 
Input and Output Facilities for the IMP Operator 
ARPA Network Data Rates Between Nodes in Kilobits/sec. 
Data Communications Conventions 
------------------------------<page break>-----------------------------
I. Network Description 
A. Introduction 
The Advanced Research Projects Agency, with the cooperation of its 
research contractors, is forming a computer communication network. By the 
distinctive nature of these contractors, this will be a highly inhomogeneous 
network. There will be many kinds of computers involved and even in those 
cases where two contractors possess similar equipment, their operating sys- 
tems and types of utilization will differ. On.the other hand, this will be 
a natwork of important potential precisely due to making these advanced re- 
search computer systems available. to users outside their own design circle. 
System variety is of utmost importance; any present similarity is to be con- 
sidered.a happenstance of equipment availability and must not be an issue 
of network design. Each system is oriented to the specialized research of 
the contractor. and after connection to the net'work will continue to operate 
primarily as a stand-alone system for that contractor 's use. Each contrac- 
tor will make some part of his facility frequently available to the network; 
however network operation must not depend upon any single contractor 's 
machine. (Hereafter a contractor 's computer is called a HOST.) 
To effect graceful disconnection of a HOST from the network and to 
guard against burdening connected HOSTS with network responsibilities, a 
communication subnet shall be constructed consisting of store-and-forward 
computers (called IPS or interface message processors) located at contrac- 
tor sites. Each IMP shall be connected to several other IMPS by full duplex 
50 kbps common carrier communication links creating a strongly 'interconnected 
net. Typically, there will be three or four full duplex lines at each site 
that can serve to benefit routing and network buffering. A list of the proj- 
ected network nodes and an illustrative interconnection graph is shown in 
appendices A and B. 
In addition to serving the research interests of the A3LPA contrac- 
tors, the network itself is a subject of study and experimentation; for this 
reason, data gatheringsfacilities are incorporated into the network and must 
be considered an  integral part of the hardware and software design of the 
communication subnet. The use of these facilities will provide a basis for 
evolution of the network design. 
------------------------------<page break>-----------------------------
B. Functional Description of the Network 
For the purpose of delineating areas of responsibility and 
specifying design requirements the network is subdivided into the follow- 
ing components: 
a. The HOST systems; 
The contractors hardware and software prior to or 
independent of the formation o construction of the 
The contractors own hardware and software. 
individually designed and implemented for his own 
convenience in attaching himself to the network. 
The cont"actors own hardware and software 
specifically oriented to his ttilization of some 
other HOST system within the network. 
a.. The CARRIER systems; 
The common carrier facilities available by 
contract prior to or.independent of the formation 
of the network. 
The circuit switches, leased lines, data sets, and 
line conditioning equipment utilized by' the network. 
b. The IMP systems; 
Th'e store-and-forward message processors 
dedicated to 'the service of the network. 
The hardwa'e interfaces .attaching the message 
processors to the data sets of the CARRIER. 
The procedures, hardware and software, for 
message transn%ission, validation, failure detec- 
tion, recovery, and data gathering. In general, 
23 Z 
------------------------------<page break>-----------------------------
thosc processes comprising the communication 
sots which rnainl.;iin' at all network sl. cs (hercaller 
called the CARRIER Side of he 
The hardware interfaccs attaching thc message 
processors to the local HOST (s). 
The procedures, hardware and software, for 
mcssage reformatting either. sen. ding or receiving 
and as specifically required for the local HOST, 
(hereafter called the HOST side of the IlViP), 
To visualize the operation of the network, consider the following examples 
of expected interactions. 
Example 1. Documentation activities using the S.R.I. t-lOST system. 
The HOST at'Stanford Research Institute.will maintain a netxvork 
library of documentation information. Some of this information is private 
to S.R.I., some is available to all network users, some is available to 
particular network users. The S.R.I. system for handling such informa- 
tion on-line is to be made available to the retworkusers. The on-line 
controls coming from an.S.R.I. console specify precisely'the program 
control of the documentation system. Consequently, .the outputs generated 
by any console in the network can be mapped into the set of S.R.I. console 
outputs by a reformatting program in the user's HOST and thus effect con- 
trols of the S.R.I. system; In the other direction, the display output to 
an S.R.I. console uniquely specifies the visible results of applying the 
above controls. Consequently, the data stream from the computer to the' 
display system can be mapped into the output data stream required to 
similarly display such visible results at the user' site. This would also 
be handled by a reformatting program in the users' MOST. 
In general, there is o0m for nany different selections of how and 
where to programmatically connect two HOST sites, the above .is only 
intended as an example. W'e could just as well elect to transport theS.R.I. 
document to the user' MOST and reformat this document to a form acceptable 
'by' the MOST system and then apply HOST display (or line printer) programs 
to the resulting document. 
Z4 3 
------------------------------<page break>-----------------------------
Example Z2 Network studies using the UCLA HOST system.. 
The HOST system at UCLA will include analysis programs for 
study/ng network performance. The design of the IMPS will include 
facilities for gathering network data-when requested and reporting this 
data to other sites. Auser at an arbitrary contractor site may schedule 
and run network experiments by supplying program controls to the UCLA 
HOST system to effect the selection of data gathered and to govern its 
analysis by the UCLA HOST system. Or, the user may elect to have 
the raw data sent to him directly for processing by his own programs. 
'to aw)hl conflicts, such cxpcrincnts will normally be scheduled and 
nonitorcd by the UGLA HOST. 
Example 3. Extended console opei'ation in the network. 
Since many sites have unique facilities, we can expect rich inter- 
action to occur, as it is only necessary to develop INTERCONNECTION 
8OFT%2%iE in order to have utilization of the power of'another contractors 
system. From the point of view of the AiPA contract'ors as users of the 
netwo.r, the 'cornrnunication subnet is a self-contained facility whose soft- 
ware and hardware is maintained by the network contractor. In designing ' 
INTERCONNECTION SOFTWARE we should only need to use the I/O'con- 
ventions for moving data into and out of the subnet and not.otherwise be 
involved in the details of subnet operation. Specifically, error checking, 
fault detection, message switchizSg, fault recoveryr line switching, carrier 
failures and carrier quality assessrqent, as required to guarantee reliable 
network performance, are the sole responsibility of the network contractor. 
However, during the period of design' and construction of the network, the 
user contractors can aid to the network conractor as suggested 
in Section 1 r B below. 
25 4 
------------------------------<page break>-----------------------------
------------------------------<page break>-----------------------------
C. Functional Description of the IlviPS. 
The set of Ilv!!oS is to serve as the interface between the set of 
HOSTS and the CARRIER network. Each transmitting HOST looks into 
the network through its adjacent I1VIP and sees itself connected to the 
receiving HOST (which responds to requests from the transmitting HOST 
after a delay due to I1Vil  and CAiP, IEP, congestion as well as its own 
congestion). Each receiving HOST sees the network through its adjacent 
/1VfP and responds to incoming data as from a set of remote terminals 
making requests. The network sees a set of I1VilS providing and accept- 
ing message traffic. Each IkiP sees the network as a source of messages 
for its receiving HOST, and as a sink for messages from its transmittin E 
HOST and from messages using it as a relay /1riP. The /1vfl, ' as part of 
its basic function must smooth out severe fluctuations in the message 
traffic by providing temporary message buffering. 
Thus, the IMP is to provide store-and-forward switching for 
messages exchanged between the HOST computers. It is to receive 
messages from its attached MOST (s) and from other IMPS connected to 
it. by means of communication circuits. These messages, or packets of 
messages, are to be forwarded, as appropriate, to the other connected 
IMPS $r to its attached MOST (s). In the execution of these functions the 
IMP is to observe the IMP-IMP communication protocol and the HOS3-IMP 
communication protocol, as established by tPA. A tentative version of 
the protocol is provided in Appendix F. 
the following functions: 
TheSe activit. ies of the IMP involve 
(1), ssageS*:'-intd*+pack 
(4) GeneratiOn, nalsis, and alteration of formatted messages 
(6)' Coordination of activities with its HOST 
Measurement of network parameters and functions 
De{ecton and disposition of faults 
 .' The specific functions to be performed by the IMPS, and the 
algorithms used to implement the functions, are all subject to change with 
------------------------------<page break>-----------------------------
The measurement activities of an IlviP will be selectively initiated 
and termLnated by control messages received from its host or another IlViP. 
8. Detection and Disposition of ]Faults 
The IiViP is to protect its,lf and the network from the effects 
of faults, whether the source of the fault is external or internal to the 
IiViP. The protection process will involve the detection of faults, and a 
reaction to faults, where a primary goal of the reaction is to contain the 
effects of a fault. These activities are to be essentially automatic requir- 
ing little or no human intervention. 
To detect faults from external .sources the RvP must continually 
examine and analyze the signals presented to it by the communication 
channels and the HOST-IAP channels. The' analyses should determine: 
(1) if the signals adhere to the established protocols 
(2) if that data contained in a message for use by an RviP 
is valid 
The various forms of error checks specified in the protocol s directly 
relate to this fault detection process. ' 
The detection of externally caused faults must also be concerned 
with abnormal time behavior of s'ignals. For Lnstance, signals that are 
too rapid or too slow in response may indicate the presence of a fault.. 
The non-responsive external source should be detected through the use 
of timing procedures.. 
Upon detection of a fault the IN[P should attempt to isolate its 
effect in a manner that results in the' corruption of a minimum number 
of messages. Such isolation may involve the negative acknowledgement 
of a packet or a message. 
P, ecovery procedures should be used to restore service, in an 
orderly manner, .when the fault has been rmoved. Transmission faults 
may be.overcome by retransmission of the faulty data. Network control 
 messages exchanged between IAKPS may report tle restoration to service. 
of a faulty IlViP or HOST. 
The IAP will be so designed that it can be stopped, started, and 
its operating program loaded or examined by selected network HOSTs. 
31 lO "' 
------------------------------<page break>-----------------------------
Such HOSTs, using special secure processes and employing the networks com- 
munications facilities, may be used to effect the remote recovery of IMPS 
suffering from serious faults. Such recovery may effect the automatic re- 
start, witha fresh program, of a halted IMP. 
9. IMP Software Separation Protection 
Since there is a portion of. the IMP software that the HOST's 
staff may write, it is desirable (not mandatory) that hardware protection 
be provided to prohibit that portion of the software from harming the basic 
IMP operation.. Standard protection hardware for providing a privileged 
executive mode should .be adequate. The cost for such hardware, if available, 
should be identified as an option. 
The protection 'desired should prohibit the HOST's staff program from: 
(1) controlling any IMP input or output operation except those 
of the HOST-IMP channel 
(2) :hanging that stored information required by the IMP to 
serve the remainder of the network 
(3) using .the processing or storage capabilities of the IMP in 
such quantities or .at times that result in reduced service 
to the remainder of the network. 
.D. The H0ST-IMP Interfaces 
Due to the variety of HOST machines and to the differences in the 
existing on-line entry points into these systems, it is not possible to 
describe a universal manner of .IMP connection appropriate to all HOST sys- 
tems. The quoter, therefore, need not propose individual modifications to 
interface to each host; rather he should propose a single standa=d interface. 
All modifications to that interface separately after contract 
It is desired to .each. IMP interface .to more than one HOST using a 
multiplexing scheme. The hardware and software necessary to accomplish the 
multiplexing may be too complicated and expensive to warrant its implementa- 
tion. Each quoter should include .his own evaluation of the additional cost 
of interfacing to multiple HOSTs, but should.not include that cost in his 
basic proposal. 
------------------------------<page break>-----------------------------